Cellebrite offers its services to law enforcement for the welfare of the public, an executive of the security firm known for breaking the security of iOS and other devices claims in an interview, while also stressing the firm's tools are not a major risk to the privacy of iPhone users in general.

Cellebrite, the Israeli security firm believed to have helped the FBI unlock an iPhone during the San Bernardino investigation, is claiming it is capable of bypassing the security of devices running iOS 11 and older versions, including recently launched hardware including the iPhone 8 and iPhone X.

Media reports are claiming that an iPhone 6 that was dredged out of the water in Spain has been unlocked by Cellebrite, and if accurate would be the first publicized report of Apple's Secure Enclave having been penetrated by third party hacking tools.

The FBI paid approximately $900,000 to a third party to help break into the iPhone 5c of San Bernardino shooter Syed Rizwan Farook, U.S. Senator Dianne Feinstein said recently when questioning FBI director James Comey at a Senate Judiciary Committee oversight hearing.

Cellebrite -- the firm thought to be responsible for helping the FBI extract data from the iPhone of San Bernardino shooter Syed Rizwan Farook -- is doing "lawful unlocking and evidence extraction" from Apple devices through the iPhone 6 and 6 Plus, according to the company's Forensics Research director.

Cellebrite, the digital forensics company believed to have helped the FBI break the security of the San Bernardino shooter's iPhone, may have repurposed other existing cracking tools used for jailbreaking iPhones, according to a new cache of files allegedly sourced from the security firm.

Cellebrite, the Israeli digital forensics firm thought to have provided the FBI with assistance to break the security of the San Bernardino shooter's iPhone, has confirmed it has been the victim of a security breach of one of its servers.